Azure DevOps Personal Access Token
#
Description#
GeneralDocumentation: https://docs.microsoft.com/en-us/azure/devops/cli/log-in-via-pat?view=azure-devops&tabs=windows
Summary: Azure is a cloud computing service created by Microsoft. The Azure DevOps personal access tokens are used to authenticate with the command line interface. This detector finds these secrets.
IPs allowlist: See API Management policies.
Scopes: Keys are specific to an API.
#
Revoke the secretKeys can be rotated from Azure portal, PowerShell and Azure CLI.
#
Check for suspicious activityAzure gives access to detailed logs, see Azure platform logs.
Azure devops personal access token
#
Details for Family: Api
Category: Cloud Provider
Company: Microsoft
High recall: False
Validity check available: False
Minimum number of matches: 1
Occurrences found for one million commits: 7.92
Prefixed: False
PreValidators:
- type: FilenameBanlistPreValidator banlist_extensions: - ^pkl$ banlist_filenames: [] check_binaries: false include_default_banlist_extensions: true ban_markup: true- type: ContentWhitelistPreValidator patterns: - azure
#
Examples- text: AZURE_TOKEN=sbwamnzekhbkhrthrkceu57534sargb7t24w5b6h55b3r3asnbbd apikey: sbwamnzekhbkhrthrkceu57534sargb7t24w5b6h55b3r3asnbbd